Access control models for incident exchange networks
ITU-T X.1550 (03/2017)
Year: 2017
Abstract: Recommendation ITU-T X.1550 introduces existing approaches for implementing access control policies for incident exchange networks. This Recommendation introduces a variety of well-established access control models, sharing models as well as criteria for evaluating incident exchange network performance. Standards-based solutions are considered to facilitate implementation of different access control models within different cybersecurity information sharing models and under diverse trust environments.
-
Statistics
Access control models for incident exchange networks
Show full item record
| contributor author | ITU-T - International Telecommunication Union/ITU Telcommunication Sector | |
| date accessioned | 2017-11-25T08:08:21Z | |
| date available | 2017-11-25T08:08:21Z | |
| date copyright | 2017-03-30 | |
| date issued | 2017 | |
| identifier other | T-REC-X.1550-201703-I!!PDF-E.pdf | |
| identifier uri | http://yse.yabesh.ir/std;query=autho162sear3FCDC52731854DD6EFDEC014A/handle/yse/251820 | |
| description abstract | Recommendation ITU-T X.1550 introduces existing approaches for implementing access control policies for incident exchange networks. This Recommendation introduces a variety of well-established access control models, sharing models as well as criteria for evaluating incident exchange network performance. Standards-based solutions are considered to facilitate implementation of different access control models within different cybersecurity information sharing models and under diverse trust environments. | |
| language | English | |
| title | Access control models for incident exchange networks | en |
| title | ITU-T X.1550 (03/2017) | num |
| type | standard | |
| status | In force | |
| tree | ITU-T - International Telecommunication Union/ITU Telcommunication Sector:;2017 | |
| contenttype | fulltext |

درباره ما